软件定义网络中的DDoS危害及预防措施

Tanzeel Sultan Rana
{"title":"软件定义网络中的DDoS危害及预防措施","authors":"Tanzeel Sultan Rana","doi":"10.32350/sir.31.04","DOIUrl":null,"url":null,"abstract":"Software Defined Network is an emerging technology which is flourishing due to its diversity and by virtue of the fact that there are decoupled planes in this architecture which have some benefits as well as drawbacks, such as the execution of cyber attacks are easy at northbound and southbound interfaces and DDoS attack can easily be manipulated in this architecture. It has been identified that DDoS attack can be countered at northbound API so that appropriate decision about illegitimate traffic can be taken. Java has provided us with a very reliable support for three decades. Hence, all controls are governed by programming interfaces in this architecture with the help of this feature and according to the entropy of information which allows us to track the traffic and compare it with the threshold to identify the malware in the network. Floodlight controller is used in this paper to accommodate the illegitimate traffic. This paper allows the programmers to program such applications in Python or Java based on the basic mechanism of entropy which uses a threshold value from which DDoS attack can be countered, as we are well aware that a large number of systems are involved in producing illegitimate traffic on a network which creates distraction for the legitimate traffic.","PeriodicalId":137307,"journal":{"name":"Scientific Inquiry and Review","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DDoS Hazard and Precautionary Measures in Software Define Network\",\"authors\":\"Tanzeel Sultan Rana\",\"doi\":\"10.32350/sir.31.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software Defined Network is an emerging technology which is flourishing due to its diversity and by virtue of the fact that there are decoupled planes in this architecture which have some benefits as well as drawbacks, such as the execution of cyber attacks are easy at northbound and southbound interfaces and DDoS attack can easily be manipulated in this architecture. It has been identified that DDoS attack can be countered at northbound API so that appropriate decision about illegitimate traffic can be taken. Java has provided us with a very reliable support for three decades. Hence, all controls are governed by programming interfaces in this architecture with the help of this feature and according to the entropy of information which allows us to track the traffic and compare it with the threshold to identify the malware in the network. Floodlight controller is used in this paper to accommodate the illegitimate traffic. This paper allows the programmers to program such applications in Python or Java based on the basic mechanism of entropy which uses a threshold value from which DDoS attack can be countered, as we are well aware that a large number of systems are involved in producing illegitimate traffic on a network which creates distraction for the legitimate traffic.\",\"PeriodicalId\":137307,\"journal\":{\"name\":\"Scientific Inquiry and Review\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Inquiry and Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32350/sir.31.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Inquiry and Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32350/sir.31.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

软件定义网络是一种新兴的技术,由于其多样性和在该架构中存在解耦平面的事实而蓬勃发展,这有一些优点,也有一些缺点,例如网络攻击很容易在北向和南向接口执行,DDoS攻击很容易在该架构中被操纵。已经确定DDoS攻击可以在北向API上进行反击,以便对非法流量做出适当的决策。30年来,Java为我们提供了非常可靠的支持。因此,在这个特性的帮助下,所有的控制都由这个架构中的编程接口控制,根据信息熵,我们可以跟踪流量,并将其与阈值进行比较,以识别网络中的恶意软件。本文采用泛光灯控制器来适应非法交通。本文允许程序员基于熵的基本机制在Python或Java中编写这样的应用程序,熵使用阈值,DDoS攻击可以被反击,因为我们很清楚,大量的系统参与在网络上产生非法流量,这会对合法流量造成干扰。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DDoS Hazard and Precautionary Measures in Software Define Network
Software Defined Network is an emerging technology which is flourishing due to its diversity and by virtue of the fact that there are decoupled planes in this architecture which have some benefits as well as drawbacks, such as the execution of cyber attacks are easy at northbound and southbound interfaces and DDoS attack can easily be manipulated in this architecture. It has been identified that DDoS attack can be countered at northbound API so that appropriate decision about illegitimate traffic can be taken. Java has provided us with a very reliable support for three decades. Hence, all controls are governed by programming interfaces in this architecture with the help of this feature and according to the entropy of information which allows us to track the traffic and compare it with the threshold to identify the malware in the network. Floodlight controller is used in this paper to accommodate the illegitimate traffic. This paper allows the programmers to program such applications in Python or Java based on the basic mechanism of entropy which uses a threshold value from which DDoS attack can be countered, as we are well aware that a large number of systems are involved in producing illegitimate traffic on a network which creates distraction for the legitimate traffic.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Properties of Graph Based on Divisor-Euler Functions Investigating the Impact of Environmental Toxicology of Heavy Metals in Fish: A Study of Rivers of Pakistan Plant-Extract of Mimusops elengi leaves and Flower-Mediated ZnO Nanoparticles: Synthesis, Characterization, and Biomedical Applications Coefficient Inequalities for Certain Subclass of Starlike Function with respect to Symmetric points related to q-exponential Function Isolation and Identification of Lawsonia Content from the Leaves of Henna (Lawsonia inermis)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1